🚨 Under Attack
Emergency Response Guide
You're being actively targeted. This guide walks you through immediate actions to contain the threat, secure your accounts, and recover from a cyberattack.
Emergency Actions
🚨 DO THIS FIRST (Next 5 Minutes)
- Disconnect from internet - Turn off WiFi and unplug ethernet immediately
- Take photos/screenshots - Document everything you see on screen
- Don't pay ransoms - Paying doesn't guarantee you'll get your data back
- Don't delete anything - You might destroy evidence or recovery options
- Call for help - Contact IT support, cybersecurity professional, or law enforcement
⚠️ When to Call Law Enforcement
- Ransomware attack or data breach
- Financial fraud or identity theft
- Stalking, harassment, or threats
- Child exploitation or human trafficking
- Nation-state or organized crime involvement
Resources: FBI IC3 (ic3.gov), Local police cyber crimes unit, Secret Service (financial crimes)
1
Contain the Threat
Goal: Stop the attack from spreading
If You Suspect Malware/Ransomware
- Isolate infected device - Disconnect from network immediately
- Identify patient zero - Which device was infected first?
- Check other devices - Scan all devices on network for infection
- Disable network shares - Prevent ransomware from spreading to shared drives
- Check backups - Are they encrypted too? When was last clean backup?
If Account Was Compromised
- Change password immediately - From a different, clean device
- Enable 2FA - If not already enabled
- Check email forwarding rules - Attackers hide here to maintain access
- Review recent activity - Login history, sent emails, file access
- Revoke app permissions - Remove third-party app access
- Check recovery options - Verify recovery email/phone haven't been changed
If Financial Account Compromised
- Call bank immediately - Freeze accounts and cards
- Dispute fraudulent charges - File disputes for unauthorized transactions
- Place fraud alert - Contact credit bureaus (Experian, Equifax, TransUnion)
- Monitor credit reports - Check for new accounts opened in your name
- File police report - Required for identity theft affidavit
2
Secure All Accounts
Goal: Lock down everything before attacker can do more damage
Change All Passwords (Priority Order)
- Email accounts - Master key to everything else
- Password manager - If compromised, everything is at risk
- Banking and financial - Credit cards, PayPal, Venmo, crypto exchanges
- Work accounts - Email, Slack, VPN, cloud storage
- Social media - Facebook, Instagram, Twitter, LinkedIn
- Cloud storage - Google Drive, Dropbox, iCloud, OneDrive
- Shopping accounts - Amazon, eBay, etc. (saved payment methods)
Enable 2FA Everywhere
- Use authenticator app (Authy, Google Authenticator), not SMS
- Save backup codes in password manager
- Consider hardware security keys (YubiKey) for critical accounts
Review Account Security
- Check login history - Look for unfamiliar locations or devices
- Review connected apps - Revoke third-party access you don't recognize
- Update recovery options - Verify recovery email and phone number
- Enable login alerts - Get notified of new sign-ins
3
Recover and Clean Up
Goal: Remove the threat and restore normal operations
If Malware/Ransomware
- Don't pay ransom - No guarantee of decryption, funds terrorism
- Check for decryption tools - Visit nomoreransom.org for free decryptors
- Wipe and reinstall - Nuclear option but safest for infected devices
- Restore from backup - Use clean backup from before infection
- Scan all devices - Use multiple antivirus tools to verify clean
If Account Compromise
- Document everything - Screenshots, timestamps, suspicious activity
- Contact support - Report compromise to platform (Google, Microsoft, etc.)
- Request account review - Have platform check for backdoors
- Monitor for 30+ days - Watch for signs attacker maintained access
If Financial Fraud
- File identity theft report - IdentityTheft.gov
- Place credit freeze - All three bureaus (free)
- Monitor credit reports - AnnualCreditReport.com (free)
- Consider credit monitoring - Paid service for ongoing protection
- Update all financial accounts - New account numbers, cards
4
Prevent Future Attacks
Goal: Build defenses so this never happens again
Immediate Improvements
- Password manager - Unique passwords for every account
- 2FA everywhere - Especially email and financial accounts
- Automatic backups - 3-2-1 rule (3 copies, 2 media types, 1 offsite)
- Software updates - Enable automatic updates on all devices
- Antivirus/EDR - Real-time protection on all computers
Long-Term Security Strategy
- Complete First Steps Defense - Master the fundamentals
- Network-level protection - Pi-hole, router hardening (Home Fortress)
- Advanced monitoring - Network traffic analysis (Power User Defense)
- Regular security audits - Monthly check-ins on accounts and devices
- Stay informed - Follow security news, learn from others' mistakes
💡 Post-Incident Analysis
Once you've recovered, figure out how it happened:
- What was the initial infection vector? (Phishing email? Malicious download?)
- What security controls failed? (No 2FA? Weak password? No backups?)
- How can you prevent this specific attack in the future?
- What early warning signs did you miss?
Learn from this. Every attack is a lesson in what needs to be fixed.
🛡️ You've Survived. Now Build Your Defenses.
Don't let this happen again. Start with the fundamentals and work your way up.
Start: First Steps Defense → View All Guides